Risk
12/20/2011
01:23 PM
50%
50%

FBI To Get More Cyber Crime Agents

But is the bureau focusing too heavily on cyberterrorism, as opposed to fighting cybercrime?

The FBI is set to receive more cyber special agents.

According to the draft of the Departments of Commerce and Justice, and Science, and Related Agencies Appropriations Bill for 2012, released earlier this month, the bureau will see increased funding for a number of types of investigations, including computer intrusions and cyber investigations.

That's important, because when it comes to computer intrusions--including foreign intelligence operations that pose a national security threat--"the FBI is in a unique position to counter cyber threats, as it is the only agency with the statutory authority, expertise, and ability to combine counterterrorism, counterintelligence, and criminal resources to neutralize, mitigate, and disrupt illegal computer-supported operations domestically," according to the House committee's appropriations bill.

Accordingly, the committee has recommended that the FBI be granted its full cyber-investigation budget request of $166.5 million, which is an increase of 13% from 2011. That will help the bureau fund 42 new positions, including 14 new special agents with cyber expertise, to "further the FBI's investigatory, intelligence gathering, and technological capabilities."

For comparison's sake, the bureau's budget for investigating national security threats will be $316 million, while the Criminal Justice Information Services Division will receive $645 million. Staffing-wise, the bureau had also requested 367 new positions for fighting white-collar crime, and 20 new positions for handling child exploitation cases.

[ The Obama administration has released a plan to bolster U.S. network security. See White House Sets Cybersecurity R&D Priorities. ]

Out of a workforce that numbers about 30,000 people, the FBI now has cyber squads in each of its 56 field offices across the country, as well as 1,000 specially trained cyber agents, analysts, and digital forensic examiners. "Together, they run complex undercover operations and examine digital evidence. They share information with our law enforcement and intelligence partners. And they teach their counterparts--both at home and abroad--how best to investigate cyber threats," said FBI director Robert S. Mueller in April, when he presented the bureau's budget requests to the House committee.

The FBI has also requested additional funding relating to the Comprehensive National Cybersecurity Initiative (CNCI), and in particular for the National Cyber Investigative Joint Task Force (NCIJTF) that it coordinates. FBI officials want the task force to no longer operate just during business hours.

Of the money being budgeted for the FBI's cyber capabilities, $5 million is to be set aside "for training for FBI cyber agents involved in national security intrusions cases," according to the committee. "This will allow the FBI to increase the number of cyber agents qualified to understand current techniques and tactics used by those engaged in illicit cyber activities, and keep abreast of emerging technologies that are used to overcome computer systems' defenses and to infiltrate networks, such as those of the U.S. government, utility companies, defense contractors, and financial institutions."

The committee said that the need for such funds had been highlighted by an April 2011 report from the Department of Justice office of the inspector general, which found that "36% of FBI field agents assigned to national security-related cyber investigations lacked the expertise, including in networking and counterintelligence, needed to investigate these types of cases and identify those responsible for intrusions." While the bureau will no doubt be thankful for the increased funding, after the audit, FBI officials sharply contested the auditors' findings, saying it presented an outdated picture of the bureau's rapidly improving cyber-investigation capabilities.

Finally, although no money was allocated for the task, the committee said that it also "encourages the FBI to expand its integration of FBI cyber agents into eastern European police services." That's astute, since many cybercrime operations launched against residents of the United States can be traced to Eastern Europe.

But is the FBI's new cybercrime budget sufficient? Law enforcement and risk management consultant Nick Selby, writing on his Police-Led Intelligence blog, said that the funding levels remain "ludicrously low," especially given the frequency with which such crimes are committed. Furthermore, he said, the FBI is the only agency "empowered to battle many types of cyber crime--for example, any cyber criminal act launched from outside the U.S. which attacks U.S. companies or government." In other words, he thinks the bureau needs more money to fight cybercrime.

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration require

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Bprince
50%
50%
Bprince,
User Rank: Ninja
12/31/2011 | 3:09:41 PM
re: FBI To Get More Cyber Crime Agents
For Internet policing to work, it not only takes more resources domestically but also global buy-in and cooperation. There have been a couple arrests this past year that are great examples of that.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0750
Published: 2015-05-22
The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.

CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.